MongoDB 数据库默认是没有用户名及密码的,即无权限访问限制。为了方便数据库的管理和安全,需创建数据库用户。

1,用户的权限

用户中权限的说明:

权限 说明
Read 允许用户读取指定数据库
readWrite 允许用户读写指定数据库
dbAdmin 允许用户在指定数据库中执行管理函数,如索引创建、删除,查看统计或访问 system.profile
userAdmin 允许用户向 system.users 集合写入,可以找指定数据库里创建、删除和管理用户
clusterAdmin 只在 admin 数据库中可用,赋予用户所有分片和复制集相关函数的管理权限。
readAnyDatabase 只在 admin 数据库中可用,赋予用户所有数据库的读权限
readWriteAnyDatabase 只在 admin 数据库中可用,赋予用户所有数据库的读写权限
userAdminAnyDatabase 只在 admin 数据库中可用,赋予用户所有数据库的 userAdmin 权限
dbAdminAnyDatabase 只在 admin 数据库中可用,赋予用户所有数据库的 dbAdmin 权限。
root 只在 admin 数据库中可用。超级账号,超级权限

更多关于用户权限的说明参照:https://docs.mongodb.com/manual/core/security-built-in-roles/

用户创建语法:

{
user: "<name>",
pwd: "<cleartext password>",
customData: { <any information> },
roles: [
{ role: "<role>",
db: "<database>" } | "<role>",
...
]
}

语法说明:

  • user 字段:用户的名字;
  • pwd 字段:用户的密码;
  • cusomData 字段:为任意内容,例如可以为用户全名介绍;
  • roles 字段:指定用户的角色,可以用一个空数组给新用户设定空角色;
  • roles 字段:可以指定内置角色和用户定义的角色。

2,创建管理员用户

到这里专门讲解用户管理了,因此配置当中开启用户认证,配置信息如下:

[root@mongodb bin]$cat mongodb.conf
#数据存储目录
dbpath=/usr/local/mongodb/data/db
#日志文件目录
logpath=/usr/local/mongodb/logs/mongodb.log
#后台运行
fork=true
auth=true
bind_ip=0.0.0.0
[root@mongodb bin]$systemctl restart mongod
[root@mongodb bin]$systemctl status mongod

进入管理数据库

[root@mongodb bin]$mongo
MongoDB shell version v4.0.10
connecting to: mongodb://127.0.0.1:27017/?gssapiServiceName=mongodb
Implicit session: session { "id" : UUID("56712ce5-d30a-421f-b447-0eea5294aafb") }
MongoDB server version: 4.0.10
> use admin

1,创建管理用户,root 权限

> use admin
switched to db admin
> db.createUser({user: "root",pwd: "root",roles: [ { role: "root", db: "admin" } ]})
Successfully added user: {"user" : "root","roles" : [{"role" : "root","db" : "admin"}]
}

注意:

创建管理员角色用户的时候,必须到 admin 下创建。

删除的时候也要到相应的库下操作。

验证用户是否能用

> db.auth("root","root")
1  # 返回 1 即为成功

2,查看创建的管理员用户

一个常见的报错:

> show users
2019-07-03T14:33:49.060+0800 E QUERY    [js] Error: command usersInfo requires authentication :
_getErrorWithCode@src/mongo/shell/utils.js:25:13
DB.prototype.getUsers@src/mongo/shell/db.js:1763:1
shellHelper.show@src/mongo/shell/utils.js:859:9
shellHelper@src/mongo/shell/utils.js:766:15
@(shellhelp2):1:1

这种报错常常出现在没有授权的情况下,刚刚也只是创建了对应的用户名以及角色,但是还没有通过 root 用户进行登陆。

> db.auth("root","root")
1
> show users
{"_id" : "admin.root","userId" : UUID("fa320150-781c-4a07-b427-c3a42f360133"),"user" : "root","db" : "admin","roles" : [{"role" : "root","db" : "admin"}],"mechanisms" : ["SCRAM-SHA-1","SCRAM-SHA-256"]
}

3,登陆数据库

注意:用户在哪个数据库下创建的,最后加上什么库,这里自然选择 admin 库。

  • 方法一:命令行中进行登陆
[root@mongodb bin]$mongo -uroot -proot admin
MongoDB shell version v4.0.10
connecting to: mongodb://127.0.0.1:27017/admin?gssapiServiceName=mongodb
Implicit session: session { "id" : UUID("3f5eda3b-89da-4ef5-bcb2-022bc0517c11") }
MongoDB server version: 4.0.10
Server has startup warnings:
2019-07-03T15:39:36.265+0800 I CONTROL  [initandlisten] ** WARNING: You are running this process as the root user, which is not recommended.
2019-07-03T15:39:36.265+0800 I CONTROL  [initandlisten]
>
  • 方法二:在数据库中进行登陆验证:
[root@mongodb bin]$ mongo
MongoDB shell version v4.0.10
connecting to: mongodb://127.0.0.1:27017/?gssapiServiceName=mongodb
Implicit session: session { "id" : UUID("896ba84c-3127-4ac1-85a9-ca4f4da3e60c") }
MongoDB server version: 4.0.10
> use admin
switched to db admin
> db.auth("root","root")
1
> show tables
system.users
system.version
  • 正常登陆之后,再次查看用户:
> show users
{"_id" : "admin.root","userId" : UUID("fa320150-781c-4a07-b427-c3a42f360133"),"user" : "root","db" : "admin","roles" : [{"role" : "root","db" : "admin"}],"mechanisms" : ["SCRAM-SHA-1","SCRAM-SHA-256"]
}

4,忘记管理员密码怎么办

有时候可能会忘记管理员密码,需要对其进行重置,这个时候,有两种方式可以更新管理员密码。

如果连用户名都忘记了,那么我们首先需要更改 MongoDB 的配置,去掉用户名密码认证的功能,然后重启。

[root@mongodb bin]$cat mongodb.conf
#数据存储目录
dbpath=/usr/local/mongodb/data/db
#日志文件目录
logpath=/usr/local/mongodb/logs/mongodb.log
#后台运行
fork=true
auth=false
bind_ip=0.0.0.0
[root@mongodb bin]$systemctl restart mongod
[root@mongodb bin]$systemctl status mongod

然后使用 mongo 命令进入到数据库,进行简单查询:

[root@localhost bin]$mongo
MongoDB shell version v4.0.10
connecting to: mongodb://127.0.0.1:27017/?gssapiServiceName=mongodb
Implicit session: session { "id" : UUID("3e0268c2-7e34-4a61-947d-f8e2368640f5") }
MongoDB server version: 4.0.10
Server has startup warnings:
2019-07-04T17:54:54.016+0800 I CONTROL  [initandlisten] ** WARNING: You are running this process as the root user, which is not recommended.
2019-07-04T17:54:54.016+0800 I CONTROL  [initandlisten]
> use admin
switched to db admin
> show users
{"_id" : "admin.root","userId" : UUID("c8514da6-4484-4036-9c13-b5deeb449575"),"user" : "root","db" : "admin","roles" : [{"role" : "root",    #这里就可以判断角色为root的账号名字也是root"db" : "admin"}],"mechanisms" : ["SCRAM-SHA-1","SCRAM-SHA-256"]
}
> show tables   #或者通过查询表来得知
system.users
system.version
> db.system.users.find()    #查询user表
{ "_id" : "admin.root", "userId" : UUID("c8514da6-4484-4036-9c13-b5deeb449575"), "user" : "root", "db" : "admin", "credentials" : { "SCRAM-SHA-1" : { "iterationCount" : 10000, "salt" : "SxO3kQwjFX8833lnQXQKbw==", "storedKey" : "1LQVQGW3ScF8WC0iCSMUJ5Iokpc=", "serverKey" : "t2PSzcZSE1KFzMXXK4BmxfPno9s=" }, "SCRAM-SHA-256" : { "iterationCount" : 15000, "salt" : "XDCd8GfHOtBiZnC6Eafx37aUV+2lO9EZbWl9rQ==", "storedKey" : "ZYHs6Umf0bVP8uofPGlcAl5uFzzQWovc4oczHjckmBs=", "serverKey" : "apVEilrpFXVAfBMMCwiIHl7H4bdnd6xm6KN88fXYJWo=" } }, "roles" : [ { "role" : "root", "db" : "admin" } ] }

得知管理员用户的名称为 root 之后,就能够进行密码更新的操作了。

利用

db.changeUserPassword
[root@localhost bin]$mongo
MongoDB shell version v4.0.10
connecting to: mongodb://127.0.0.1:27017/?gssapiServiceName=mongodb
Implicit session: session { "id" : UUID("3e0268c2-7e34-4a61-947d-f8e2368640f5") }
MongoDB server version: 4.0.10
Server has startup warnings:
2019-07-04T17:54:54.016+0800 I CONTROL  [initandlisten] ** WARNING: You are running this process as the root user, which is not recommended.
2019-07-04T17:54:54.016+0800 I CONTROL  [initandlisten]
> use admin
switched to db admin
> db.changeUserPassword('root','test1')

然后重新开启用户认证,重启验证。

[root@mongodb bin]$cat mongodb.conf
#数据存储目录
dbpath=/usr/local/mongodb/data/db
#日志文件目录
logpath=/usr/local/mongodb/logs/mongodb.log
#后台运行
fork=true
auth=true
bind_ip=0.0.0.0
[root@mongodb bin]$systemctl restart mongod
[root@mongodb bin]$systemctl status mongod

登陆一下:

[root@localhost bin]$mongo -uroot -ptest1 admin
MongoDB shell version v4.0.10
connecting to: mongodb://127.0.0.1:27017/admin?gssapiServiceName=mongodb
Implicit session: session { "id" : UUID("7ebe8a49-a750-46b1-a59e-c95abc0d7401") }
MongoDB server version: 4.0.10
Server has startup warnings:
2019-07-04T18:06:24.623+0800 I CONTROL  [initandlisten] ** WARNING: You are running this process as the root user, which is not recommended.
2019-07-04T18:06:24.623+0800 I CONTROL  [initandlisten]
> db
admin
> show users
{"_id" : "admin.root","userId" : UUID("c8514da6-4484-4036-9c13-b5deeb449575"),"user" : "root","db" : "admin","roles" : [{"role" : "root","db" : "admin"}],"mechanisms" : ["SCRAM-SHA-1","SCRAM-SHA-256"]
}

3,按生产需求创建应用用户

因为目前用户规划都还比较简单,因此创建用户的时候,都是基于 admin 来进行。

1,创建某库的读写用户

  • 创建 test 用户,权限为读写
[root@mongodb bin]$mongo -uroot -proot admin    #使用admin登陆
MongoDB shell version v4.0.10
connecting to: mongodb://127.0.0.1:27017/admin?gssapiServiceName=mongodb
Implicit session: session { "id" : UUID("3f5eda3b-89da-4ef5-bcb2-022bc0517c11") }
MongoDB server version: 4.0.10
Server has startup warnings:
2019-07-03T15:39:36.265+0800 I CONTROL  [initandlisten] ** WARNING: You are running this process as the root user, which is not recommended.
2019-07-03T15:39:36.265+0800 I CONTROL  [initandlisten]
> use eryajf    #一定要注意,给哪个库授权就要先切换到对应的库,不然这个用户将无法登陆
> db.createUser({user: "test",pwd: "test",roles: [ { role: "readWrite", db: "eryajf" } ]})  #创建读写用户
Successfully added user: {"user" : "test","roles" : [{"role" : "readWrite","db" : "eryajf"}]
}
> show users    #查看用户
{"_id" : "eryajf.test","userId" : UUID("3bd64373-13c5-4a47-95f9-92a2433c0bf4"),"user" : "test","db" : "eryajf","roles" : [{"role" : "readWrite","db" : "eryajf"}],"mechanisms" : ["SCRAM-SHA-1","SCRAM-SHA-256"]
}

注意:给哪个库创建用户,授权用户,都要先use到对应的库,否则将不生效,删除用户也是。

  • 测试用户权限
[root@localhost bin]$mongo -utest -ptest eryajf
MongoDB shell version v4.0.10
connecting to: mongodb://127.0.0.1:27017/eryajf?gssapiServiceName=mongodb
Implicit session: session { "id" : UUID("dd97a5e3-9226-4a04-8221-dec566edc1c3") }
MongoDB server version: 4.0.10
> db.createCollection('d')
{ "ok" : 1 }
> db.getCollectionNames()
[ "a", "b", "c", "d" ]

2,创建对某库的只读用户

  • 在 eryajf 库创建只读用户 test
[root@localhost bin]$mongo -uroot -proot admin
MongoDB shell version v4.0.10
connecting to: mongodb://127.0.0.1:27017/admin?gssapiServiceName=mongodb
Implicit session: session { "id" : UUID("b1d0e8f4-6c13-4c27-abfa-b8035f983453") }
MongoDB server version: 4.0.10
Server has startup warnings:
2019-07-04T00:16:54.097+0800 I CONTROL  [initandlisten] ** WARNING: You are running this process as the root user, which is not recommended.
2019-07-04T00:16:54.097+0800 I CONTROL  [initandlisten]
> use eryajf    #切换到对应库
> db.createUser({user: "test1",pwd: "test1",roles: [ { role: "read", db: "eryajf" } ]}) #创建对应用户
Successfully added user: {"user" : "test1","roles" : [{"role" : "read","db" : "eryajf"}]
}
> show users    #查看用户
{"_id" : "eryajf.test","userId" : UUID("3bd64373-13c5-4a47-95f9-92a2433c0bf4"),"user" : "test","db" : "eryajf","roles" : [{"role" : "readWrite","db" : "eryajf"}],"mechanisms" : ["SCRAM-SHA-1","SCRAM-SHA-256"]
}
{"_id" : "eryajf.test1","userId" : UUID("eb2e54b8-a036-40a8-b8d4-5c8f5548ad25"),"user" : "test1","db" : "eryajf","roles" : [{"role" : "read","db" : "eryajf"}],"mechanisms" : ["SCRAM-SHA-1","SCRAM-SHA-256"]
}
  • 登录 test 用户,并测试是否只读
[root@localhost bin]$mongo -utest1 -ptest1 eryajf
MongoDB shell version v4.0.10
connecting to: mongodb://127.0.0.1:27017/eryajf?gssapiServiceName=mongodb
Implicit session: session { "id" : UUID("cca6f744-47e6-4bcb-8682-8c1af7080108") }
MongoDB server version: 4.0.10
> db.getCollectionNames()   #可以正常查询
[ "a", "b", "c", "d" ]
> db.createCollection('e')  #创建报错
{"ok" : 0,"errmsg" : "not authorized on eryajf to execute command { create: \"e\", lsid: { id: UUID(\"cca6f744-47e6-4bcb-8682-8c1af7080108\") }, $db: \"eryajf\" }","code" : 13,"codeName" : "Unauthorized"
}
>

3,创建对多库不同权限的用户

  • 创建对 test 为读写权限,对 eryajf 库为只读权限的用户
[root@localhost bin]$mongo -uroot -proot admin
MongoDB shell version v4.0.10
connecting to: mongodb://127.0.0.1:27017/admin?gssapiServiceName=mongodb
Implicit session: session { "id" : UUID("c5e35008-0a1e-4513-9394-947e49f67f81") }
MongoDB server version: 4.0.10
Server has startup warnings:
2019-07-04T00:16:54.097+0800 I CONTROL  [initandlisten] ** WARNING: You are running this process as the root user, which is not recommended.
2019-07-04T00:16:54.097+0800 I CONTROL  [initandlisten]
> use test  #切换到test库
switched to db test
> db.createUser({user: "app",pwd: "app",roles: [ { role: "readWrite", db: "test" },{ role: "read", db: "eryajf" }]})    #创建用户
Successfully added user: {"user" : "app","roles" : [{"role" : "readWrite","db" : "test"},{"role" : "read","db" : "eryajf"}]
}
> show users    #查看用户
{"_id" : "test.app","userId" : UUID("e25d6c21-190a-44e4-8868-868a474fcf12"),"user" : "app","db" : "test","roles" : [{"role" : "readWrite","db" : "test"},{"role" : "read","db" : "eryajf"}],"mechanisms" : ["SCRAM-SHA-1","SCRAM-SHA-256"]
}

注意,这个时候创建的用户,是基于 test 库创建的,那么后续登陆等操作,也都需要跟上 test 库,而不能够跟上 eryajf 的库。如果跟上 eryajf 的库,将会报如下错误:

[root@localhost bin]$mongo -uapp -papp eryajf
MongoDB shell version v4.0.10
connecting to: mongodb://127.0.0.1:27017/eryajf?gssapiServiceName=mongodb
2019-07-04T00:54:54.617+0800 E QUERY    [js] Error: Authentication failed. :
connect@src/mongo/shell/mongo.js:344:17
@(connect):2:6
exception: connect failed
  • 查看并测试用户
[root@localhost bin]$mongo -uapp -papp test
MongoDB shell version v4.0.10
connecting to: mongodb://127.0.0.1:27017/test?gssapiServiceName=mongodb
Implicit session: session { "id" : UUID("8cef0c4a-3f3d-4802-8926-79aea22db826") }
MongoDB server version: 4.0.10
> db.createCollection('a')
{ "ok" : 1 }
> db.getCollectionNames()
[ "a" ]
> use eryajf
switched to db eryajf
> db.getCollectionNames()
[ "a", "b", "c", "d" ]

4,更改用户权限

其实更改权限无非就是更改用户的角色,因为在 MongoDB 中,角色决定了不同用户的不同权限。

先查看一下当前用户的角色

[root@localhost bin]$mongo -uroot -ptest1 admin
MongoDB shell version v4.0.10
connecting to: mongodb://127.0.0.1:27017/admin?gssapiServiceName=mongodb
Implicit session: session { "id" : UUID("dbda85c8-7a90-4143-a31c-7a8ea58b80cc") }
MongoDB server version: 4.0.10
Server has startup warnings:
2019-07-04T18:06:24.623+0800 I CONTROL  [initandlisten] ** WARNING: You are running this process as the root user, which is not recommended.
2019-07-04T18:06:24.623+0800 I CONTROL  [initandlisten]
> use eryajf
switched to db eryajf
> show users
{"_id" : "eryajf.test","userId" : UUID("3bd64373-13c5-4a47-95f9-92a2433c0bf4"),"user" : "test","db" : "eryajf","roles" : [{"role" : "readWrite",   #可以看到test用户是readWrite的角色"db" : "eryajf"}],"mechanisms" : ["SCRAM-SHA-1","SCRAM-SHA-256"]
}
{"_id" : "eryajf.test1","userId" : UUID("eb2e54b8-a036-40a8-b8d4-5c8f5548ad25"),"user" : "test1","db" : "eryajf","roles" : [{"role" : "read",    #可以看到test1用户是read的角色"db" : "eryajf"}],"mechanisms" : ["SCRAM-SHA-1","SCRAM-SHA-256"]
}
  • 更改用户角色
[root@localhost bin]$mongo -uroot -ptest1 admin
MongoDB shell version v4.0.10
connecting to: mongodb://127.0.0.1:27017/admin?gssapiServiceName=mongodb
Implicit session: session { "id" : UUID("dbda85c8-7a90-4143-a31c-7a8ea58b80cc") }
MongoDB server version: 4.0.10
Server has startup warnings:
2019-07-04T18:06:24.623+0800 I CONTROL  [initandlisten] ** WARNING: You are running this process as the root user, which is not recommended.
2019-07-04T18:06:24.623+0800 I CONTROL  [initandlisten]
> use eryajf
switched to db eryajf
> db.updateUser("test",{roles:[{role:"dbAdmin",db:"eryajf"}]})
> show users
{"_id" : "eryajf.test","userId" : UUID("3bd64373-13c5-4a47-95f9-92a2433c0bf4"),"user" : "test","db" : "eryajf","roles" : [{"role" : "dbAdmin", #可以看到权限已经更新"db" : "eryajf"}],"mechanisms" : ["SCRAM-SHA-1","SCRAM-SHA-256"]
}
{"_id" : "eryajf.test1","userId" : UUID("eb2e54b8-a036-40a8-b8d4-5c8f5548ad25"),"user" : "test1","db" : "eryajf","roles" : [{"role" : "read","db" : "eryajf"}],"mechanisms" : ["SCRAM-SHA-1","SCRAM-SHA-256"]
}

5,删除用户

  • 删除 app 用户:先登录到 admin 数据库
[root@localhost bin]$mongo -uroot -proot admin
MongoDB shell version v4.0.10
connecting to: mongodb://127.0.0.1:27017/admin?gssapiServiceName=mongodb
Implicit session: session { "id" : UUID("6edeba63-e2bf-477c-a098-965767d105b6") }
MongoDB server version: 4.0.10
Server has startup warnings:
2019-07-04T00:16:54.097+0800 I CONTROL  [initandlisten] ** WARNING: You are running this process as the root user, which is not recommended.
2019-07-04T00:16:54.097+0800 I CONTROL  [initandlisten]
>
  • 进入 test 库删除 app 用户
> use test
switched to db test
> show users
{"_id" : "test.app","userId" : UUID("e25d6c21-190a-44e4-8868-868a474fcf12"),"user" : "app","db" : "test","roles" : [{"role" : "readWrite","db" : "test"},{"role" : "read","db" : "eryajf"}],"mechanisms" : ["SCRAM-SHA-1","SCRAM-SHA-256"]
}
> db.dropUser("app")
true
> show users

到这里,基本上能够体会到,MongoDB 当中那些关于角色用户权限规则的定义与配置了,MongoDB 自身已经定义好了许多个角色,这些角色针对全局,而在创建用户的时候,用户,角色,库这三个概念又是分离的,因此要多多体会,去理解三者的关系。

6,其他授权

  • 创建 app 数据库的管理员:先登录到 admin 数据库
[root@localhost bin]$mongo -uroot -proot admin
MongoDB shell version v4.0.10
connecting to: mongodb://127.0.0.1:27017/admin?gssapiServiceName=mongodb
Implicit session: session { "id" : UUID("572862cc-456d-4f5f-98ea-e65054411de6") }
MongoDB server version: 4.0.10
Server has startup warnings:
2019-07-04T00:16:54.097+0800 I CONTROL  [initandlisten] ** WARNING: You are running this process as the root user, which is not recommended.
2019-07-04T00:16:54.097+0800 I CONTROL  [initandlisten]
> use app
switched to db app
> db.createUser({user: "admin",pwd: "admin",roles: [ { role: "dbAdmin", db: "app" } ]})
Successfully added user: {"user" : "admin","roles" : [{"role" : "dbAdmin","db" : "app"}]
}
> show users
{"_id" : "app.admin","userId" : UUID("01e196c8-2119-488b-9d11-b969db266aea"),"user" : "admin","db" : "app","roles" : [{"role" : "dbAdmin","db" : "app"}],"mechanisms" : ["SCRAM-SHA-1","SCRAM-SHA-256"]
}
  • 创建 app 数据库读写权限的用户并具有 clusterAdmin 权限,要当心,这个用户的权限可是相当大的。
[root@localhost bin]$mongo -uroot -proot admin
MongoDB shell version v4.0.10
connecting to: mongodb://127.0.0.1:27017/admin?gssapiServiceName=mongodb
Implicit session: session { "id" : UUID("572862cc-456d-4f5f-98ea-e65054411de6") }
MongoDB server version: 4.0.10
Server has startup warnings:
2019-07-04T00:16:54.097+0800 I CONTROL  [initandlisten] ** WARNING: You are running this process as the root user, which is not recommended.
2019-07-04T00:16:54.097+0800 I CONTROL  [initandlisten]
> use app
switched to db app
> db.createUser({user: "super-app",pwd: "super-app",roles: [ { role: "readWrite", db: "app" },{ role: "clusterAdmin", db: "admin" }]})
Successfully added user: {"user" : "super-app","roles" : [{"role" : "readWrite","db" : "app"},{"role" : "clusterAdmin","db" : "admin"}]
}
> show users
{"_id" : "app.super-app","userId" : UUID("7533af91-3063-4460-8cb5-f77061eb5680"),"user" : "super-app","db" : "app","roles" : [{"role" : "readWrite","db" : "app"},{"role" : "clusterAdmin","db" : "admin"}],"mechanisms" : ["SCRAM-SHA-1","SCRAM-SHA-256"]
}

4,官方文档

如果想要更加深入钻研用户权限问题,可以参考官方文档:https://docs.mongodb.com/manual/reference/method/js-user-management/

MongoDB日常运维之用户管理相关推荐

  1. 【linux运维】用户管理并赋管理员权限

    前言 工作中经常与linux系统打交道,涉及到用户账户及权限的问题,特此记录下操作过程. 正文 前提 添加/删除用户.修改密码需要用到root用户(sudo xx): 添加用户并设置密码 # 添加用户 ...

  2. Kafka的灵魂伴侣Logi-KafkaManger(5)之运维管控–平台管理(用户管理和平台配置)

    推荐一款非常好用的kafka管理平台,kafka的灵魂伴侣 滴滴开源Logi-KafkaManager 一站式Kafka监控与管控平台 技术交流 有想进滴滴LogI开源用户群的加我个人微信: jjdl ...

  3. 集群资源分配_推荐一款MySQL日常运维和集群管理的自动化平台--Arkcontrol

    概述 今天主要推荐Arkcontrol这个平台,比inception还要强大,目前主要是用在mysql上,如果大家有玩mysql的话,不烦一起来看看吧~ Arkcontrol Arkcontrol是极 ...

  4. Linux 系统日常运维九大技能和运维网络知识总结

    一.Linux 系统日常运维九大技能 1.安装部署 方式:U盘,光盘和网络安装 其中网络安装已经成为了目前批量部署的首选方式:主要工具有Cobbler和PXE+kickstart 可以参考如下链接内容 ...

  5. [10] Linux系统日常运维

    [10] Linux系统日常运维 10.1 使用w查看系统负载 [root@Temence ~]# w19:28:05 up 45 days, 9:20, 1 user, load average: ...

  6. 数据中心存储日常运维【13】

    文章目录 管理员指南 管理员角色及权限 常用管理软件 维护项目总览 首次维保项目 每日和每周定期维护项目 例行维护 工具巡检 人工巡检 收集存储系统信息 日常管理 日常管理项目总览 上下电存储设备 管 ...

  7. 【9.30】日常运维——rsync、系统日志

    [9.30]日常运维--rsync.系统日志 10.28 rsync 工具介绍 10.29/10.30 rsync 常用选项 10.31 rsync 通过ssh同步 10.32/10.33 rsync ...

  8. 0418第十五次课:日常运维-防火墙、定时任务、系统管理

    2019独角兽企业重金招聘Python工程师标准>>> 日常运维-防火墙.定时任务 一.iptables的备份及恢复 iptables 规则备份 防火墙规则只存在内存中,并没保存在文 ...

  9. Linux系统运维九大技能及知识总结,90%日常运维

    Linux 系统运维九大技能及知识总结,搞定 90% 日常运维 | 周末送资料 以下内容包括RedHat和CentOS运维工作中常用的几大技能,并总结了系统运维中网络方面的规划.操作及故障处理等知识. ...

最新文章

  1. 深入理解 JVM Class文件格式(五)
  2. 物以类聚:对象也有生命
  3. cin.ignore()函数的使用
  4. 20190913每日一句
  5. 德国人制作的 Windows 2000/XP 优化脚本2.2_build9 (2008-05-31)
  6. 辽宁移动计算机类专业笔试题库,2019辽宁中国移动笔试行测模拟题(八)
  7. 软件概要设计与详细设计
  8. MariaDB安装报1067错误解决方式
  9. 计算机网络应用班级口号霸气押韵,跑操口号大全(精选50句)
  10. 拳皇97用什么计算机语言编写,拳皇97这几个人物非常适合新手,用来打电脑可轻松通关...
  11. 小样本(少样本)目标检测概述(few-shot object detection)
  12. 干货分享 | 创业公司绝对不会告诉你他们在用的工具们
  13. React 16.x折腾记 - (7) 基于React+Antd封装聊天记录(用到React的memo,lazy, Suspense这些)
  14. Win11系统UAC被禁用怎么打开
  15. 2020 第十一届蓝桥杯大赛软件类省赛第二场 C/C++ 大学 B 组 完整题面和题解
  16. echarts热力背景图_echarts自定义背景图片
  17. 不知道视频转文字软件哪个好用?视频转文字软件大分享
  18. 如何实现沉浸式视频体验?
  19. 计算机命令大全游戏,电脑小知识cmd命令大全【图文教程】
  20. OpenCV学习之利用背景建模检测运动物体

热门文章

  1. 中国电子学会2022年python六级考试真题大题 类与对象练习题
  2. stm32cubeIDE STLINK连接SWD接口调试,启动GDB server失败的处理
  3. 【科普向】谁都能看懂的CRC(循环冗余校验)原理
  4. 移动通信中的信道编码基础
  5. 数模学习第三天--微分方程(传染病模型)
  6. Java---设计【运动会成绩管理系统】
  7. 索画(金山2022)
  8. python反向切片_python切片
  9. 【人工智能】人工智能发展简史 | 复习笔记
  10. STM32F407单片机读取USR-WIFI232-B2模块的MAC地址